Rule Library

Sigma Rules

38 rules found for "Elastic Security"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

AWS Route 53 Domain Transfer Lock Disabled

Detects when a transfer lock was removed from a Route 53 domain. It is recommended to refrain from performing this action unless intending to transfer the domain to a different registrar.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential AccessT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionlowtest

AWS Route 53 Domain Transferred to Another Account

Detects when a request has been made to transfer a Route 53 domain to another AWS account.

AWScloudtrail
TA0003 · PersistenceTA0006 · Credential AccessTA0004 · Privilege EscalationT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionmediumtest

Payload Decoded and Decrypted via Built-in Utilities

Detects when a built-in utility is used to decode and decrypt a payload after a macOS disk image (DMG) is executed. Malware authors may attempt to evade detection and trick users into executing malicious code by encoding and encrypting their payload and placing it in a disk image file. This behavior is consistent with adware or malware families such as Bundlore and Shlayer.

macOSProcess Creation
T1059 · Command and Scripting InterpreterT1204 · User ExecutionTA0002 · ExecutionT1140 · Deobfuscate/Decode Files or Information+3
Tim Rauch+1Mon Oct 17macos
Detectionmediumtest

Suspicious Execution via macOS Script Editor

Detects when the macOS Script Editor utility spawns an unusual child process.

macOSProcess Creation
T1566 · PhishingT1566.002 · Spearphishing LinkTA0001 · Initial AccessT1059 · Command and Scripting Interpreter+7
Tim Rauch+1Fri Oct 21macos
Detectionhightest

Potential WizardUpdate Malware Infection

Detects the execution traces of the WizardUpdate malware. WizardUpdate is a macOS trojan that attempts to infiltrate macOS machines to steal data and it is associated with other types of malicious payloads, increasing the chances of multiple infections on a device.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionmediumtest

Potential XCSSET Malware Infection

Identifies the execution traces of the XCSSET malware. XCSSET is a macOS trojan that primarily spreads via Xcode projects and maliciously modifies applications. Infected users are also vulnerable to having their credentials, accounts, and other vital data stolen.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionhightest

Potential Privilege Escalation via Local Kerberos Relay over LDAP

Detects a suspicious local successful logon event where the Logon Package is Kerberos, the remote address is set to localhost, and the target user SID is the built-in local Administrator account. This may indicate an attempt to leverage a Kerberos relay attack variant that can be used to elevate privilege locally from a domain joined limited user to local System privileges.

Windowssecurity
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0006 · Credential AccessT1548 · Abuse Elevation Control Mechanism
Elastic SecurityWed Apr 27windows
Detectionhightest

Service Installed By Unusual Client - Security

Detects a service installed by a client which has PID 0 or whose parent has PID 0

Windowssecurity
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Tim Rauch+1Thu Sep 15windows
Detectionmediumtest

Group Policy Abuse for Privilege Addition

Detects the first occurrence of a modification to Group Policy Object Attributes to add privileges to user accounts or use them to add users as local admins.

Windowssecurity
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
Elastic Security+2Wed Sep 04windows
Detectionmediumtest

Startup/Logon Script Added to Group Policy Object

Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification+1
Elastic Security+2Fri Sep 06windows
Detectionhightest

Possible Shadow Credentials Added

Detects possible addition of shadow credentials to an active directory object.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential AccessT1556 · Modify Authentication Process
Nasreddine Bencherchali (Nextron Systems)+1Mon Oct 17windows
Detectionhightest

Service Installed By Unusual Client - System

Detects a service installed by a client which has PID 0 or whose parent has PID 0

Windowssystem
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Tim Rauch+1Thu Sep 15windows
Detectionhightest

Unusual File Modification by dns.exe

Detects an unexpected file being modified by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

WindowsFile Change
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionhightest

Unusual File Deletion by Dns.exe

Detects an unexpected file being deleted by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

WindowsFile Delete
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionmediumtest

Potential Initial Access via DLL Search Order Hijacking

Detects attempts to create a DLL file to a known desktop application dependencies folder such as Slack, Teams or OneDrive and by an unusual process. This may indicate an attempt to load a malicious module via DLL search order hijacking.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1566 · PhishingT1566.001 · Spearphishing Attachment+4
Tim Rauch+1Fri Oct 21windows
Detectionhightest

Potential Invoke-Mimikatz PowerShell Script

Detects Invoke-Mimikatz PowerShell script and alike. Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords.

WindowsPowerShell Script
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+1Wed Sep 28windows
Detectionmediumtest

Windows Defender Exclusions Added - PowerShell

Detects modifications to the Windows Defender configuration settings using PowerShell to add exclusions

WindowsPowerShell Script
TA0005 · Defense EvasionT1562 · Impair DefensesTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Tim Rauch+1Fri Sep 16windows
Detectionmediumtest

Unusual Parent Process For Cmd.EXE

Detects suspicious parent process for cmd.exe

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Tim Rauch+1Wed Sep 21windows
Detectionmediumtest

Conhost Spawned By Uncommon Parent Process

Detects when the Console Window Host (conhost.exe) process is spawned by an uncommon parent process, which could be indicative of potential code injection activity.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Tim Rauch+1Wed Sep 28windows
Detectionmediumtest

Remote File Download Via Desktopimgdownldr Utility

Detects the desktopimgdownldr utility being used to download a remote file. An adversary may use desktopimgdownldr to download arbitrary files as an alternative to certutil.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Tim Rauch+1Tue Sep 27windows
Detectionhightest

Unusual Child Process of dns.exe

Detects an unexpected process spawning from dns.exe which may indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionmediumtest

Forfiles Command Execution

Detects the execution of "forfiles" with the "/c" flag. While this is an expected behavior of the tool, it can be abused in order to proxy execution through it with any binary. Can be used to bypass application whitelisting.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Tim Rauch+4Tue Jun 14windows
Detectionhightest

Microsoft IIS Service Account Password Dumped

Detects the Internet Information Services (IIS) command-line tool, AppCmd, being used to list passwords

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+2Tue Nov 08windows
Detectionhightest

Microsoft IIS Connection Strings Decryption

Detects use of aspnet_regiis to decrypt Microsoft IIS connection strings. An attacker with Microsoft IIS web server access via a webshell or alike can decrypt and dump any hardcoded connection strings, such as the MSSQL service account password using aspnet_regiis command.

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+1Wed Sep 28windows
Detectionhightest

Suspicious Microsoft OneNote Child Process

Detects suspicious child processes of the Microsoft OneNote application. This may indicate an attempt to execute malicious embedded objects from a .one file.

WindowsProcess Creation
T1566 · PhishingT1566.001 · Spearphishing AttachmentTA0001 · Initial Access
Tim Rauch+2Fri Oct 21windows
Detectionhightest

Suspicious Outlook Child Process

Detects a suspicious process spawning from an Outlook process.

WindowsProcess Creation
TA0002 · ExecutionT1204.002 · Malicious File
Michael Haag+4Mon Feb 28windows
Detectionmediumtest

Windows Firewall Disabled via PowerShell

Detects attempts to disable the Windows Firewall using PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defenses
Tim Rauch+1Wed Sep 14windows
Detectionhightest

Deletion of Volume Shadow Copies via WMI with PowerShell

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Tim Rauch+1Tue Sep 20windows
Detectionhightest

Suspicious NTLM Authentication on the Printer Spooler Service

Detects a privilege elevation attempt by coercing NTLM authentication on the Printer Spooler service

WindowsProcess Creation
TA0004 · Privilege EscalationTA0006 · Credential AccessT1212 · Exploitation for Credential Access
Elastic Security+1Wed May 04windows
Detectionmediumtest

Suspicious Scheduled Task Creation via Masqueraded XML File

Detects the creation of a scheduled task using the "-XML" flag with a file without the '.xml' extension. This behavior could be indicative of potential defense evasion attempt during persistence

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0005 · Defense EvasionTA0003 · Persistence+2
Swachchhanda Shrawan Poudel+1Thu Apr 20windows
Detectionhightest

Privilege Escalation via Named Pipe Impersonation

Detects a remote file copy attempt to a hidden network share. This may indicate lateral movement or data staging activity.

WindowsProcess Creation
TA0008 · Lateral MovementT1021 · Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionmediumtest

Potential Remote Desktop Tunneling

Detects potential use of an SSH utility to establish RDP over a reverse SSH Tunnel. This can be used by attackers to enable routing of network packets that would otherwise not reach their intended destination.

WindowsProcess Creation
TA0008 · Lateral MovementT1021 · Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionmediumtest

UAC Bypass via Windows Firewall Snap-In Hijack

Detects attempts to bypass User Account Control (UAC) by hijacking the Microsoft Management Console (MMC) Windows Firewall snap-in

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Tim Rauch+1Tue Sep 27windows
Detectionhightest

UAC Bypass via ICMLuaUtil

Detects the pattern of UAC Bypass using ICMLuaUtil Elevated COM interface

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Florian Roth (Nextron Systems)+1Tue Sep 13windows
Emerging Threatmediumexperimental

Potential SAP NetWeaver Webshell Creation - Linux

Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as CVE-2025-31324.

LinuxFile Event
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Potential SAP NetWeaver Webshell Creation

Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as CVE-2025-31324.

WindowsFile Event
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Suspicious Child Process of SAP NetWeaver - Linux

Detects suspicious child processes spawned by SAP NetWeaver on Linux systems that could indicate potential exploitation of vulnerability that allows arbitrary execution via webshells such as CVE-2025-31324.

LinuxProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Suspicious Child Process of SAP NetWeaver

Detects suspicious child processes spawned by SAP NetWeaver that could indicate potential exploitation of vulnerability that allows arbitrary execution via webshells such as CVE-2025-31324.

WindowsProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025